Sciweavers

ICDE
2011
IEEE
245views Database» more  ICDE 2011»
12 years 8 months ago
Distributed cube materialization on holistic measures
—Cube computation over massive datasets is critical for many important analyses done in the real world. Unlike commonly studied algebraic measures such as SUM that are amenable t...
Arnab Nandi, Cong Yu, Philip Bohannon, Raghu Ramak...
ICDE
2011
IEEE
217views Database» more  ICDE 2011»
12 years 8 months ago
T-verifier: Verifying truthfulness of fact statements
— The Web has become the most popular place for people to acquire information. Unfortunately, it is widely recognized that the Web contains a significant amount of untruthful inf...
Xian Li, Weiyi Meng, Clement T. Yu
ICDE
2011
IEEE
217views Database» more  ICDE 2011»
12 years 8 months ago
Partitioning techniques for fine-grained indexing
— Many data-intensive websites use databases that grow much faster than the rate that users access the data. Such growing datasets lead to ever-increasing space and performance o...
Eugene Wu 0002, Samuel Madden
ICDE
2011
IEEE
238views Database» more  ICDE 2011»
12 years 8 months ago
Join queries on uncertain data: Semantics and efficient processing
— Uncertain data is quite common nowadays in a variety of modern database applications. At the same time, the join operation is one of the most important but expensive operations...
Tingjian Ge
ICDE
2011
IEEE
222views Database» more  ICDE 2011»
12 years 8 months ago
Dynamic prioritization of database queries
— Enterprise database systems handle a variety of diverse query workloads that are of different importance to the business. For example, periodic reporting queries are usually mi...
Sivaramakrishnan Narayanan, Florian Waas
ICDE
2011
IEEE
263views Database» more  ICDE 2011»
12 years 8 months ago
Adding regular expressions to graph reachability and pattern queries
—It is increasingly common to find graphs in which edges bear different types, indicating a variety of relationships. For such graphs we propose a class of reachability queries ...
Wenfei Fan, Jianzhong Li, Shuai Ma, Nan Tang, Ying...
ICDE
2011
IEEE
253views Database» more  ICDE 2011»
12 years 8 months ago
Preventing equivalence attacks in updated, anonymized data
—In comparison to the extensive body of existing work considering publish-once, static anonymization, dynamic anonymization is less well studied. Previous work, most notably
Yeye He, Siddharth Barman, Jeffrey F. Naughton
ICDE
2011
IEEE
241views Database» more  ICDE 2011»
12 years 8 months ago
Advanced search, visualization and tagging of sensor metadata
— As sensors continue to proliferate, the capabilities of effectively querying not only sensor data but also its metadata becomes important in a wide range of applications. This ...
Ioannis K. Paparrizos, Hoyoung Jeung, Karl Aberer
ICDE
2011
IEEE
274views Database» more  ICDE 2011»
12 years 8 months ago
SQPR: Stream query planning with reuse
—When users submit new queries to a distributed stream processing system (DSPS), a query planner must allocate physical resources, such as CPU cores, memory and network bandwidth...
Evangelia Kalyvianaki, Wolfram Wiesemann, Quang Hi...
ICDE
2011
IEEE
245views Database» more  ICDE 2011»
12 years 8 months ago
Stochastic skyline operator
— In many applications involving the multiple criteria optimal decision making, users may often want to make a personal trade-off among all optimal solutions. As a key feature, t...
Xuemin Lin, Ying Zhang, Wenjie Zhang, Muhammad Aam...